Multi-fabric deployment and management platform

    公开(公告)号:US11418399B2

    公开(公告)日:2022-08-16

    申请号:US16399043

    申请日:2019-04-30

    Abstract: The present technology provides a framework for user-guided end-to-end automation of network deployment and management, that enables a user to guide the automation process for any kind of network deployment from the ground up, as well as offering network management, visibility, and compliance verification. The disclosed technology accomplishes this by creating a stateful and interactive virtual representation of a fabric using a customizable underlay fabric template instantiated with user-provided parameter values and network topology data computed from one or more connected network devices. A set of expected configurations corresponding to the user-specified underlay and overly fabric policies is then generated for deployment onto the connected network devices. Network deviations from the intended fabric policies are addressed by the provision of one or more configuration lines to be deployed onto or removed from the connected network devices to bring the network state in agreement with the set of expected configuration.

    CONFIGURING SECURE CONNECTIVITY BETWEEN DEVICES IN SEPARATE SITES OF A MULTI-SITE DOMAIN

    公开(公告)号:US20210377128A1

    公开(公告)日:2021-12-02

    申请号:US16930947

    申请日:2020-07-16

    Abstract: Techniques for utilizing a Software-Defined-Networking (SDN) controller and/or a Data Center Network Manager (DCNM) and network border gateway switches associated with a multi-site cloud computing network to provide reachability data indicating physical links between the border gateways disposed in different sites of the multi-site network to establish secure connection tunnels utilizing the physical links and unique encryption keys. The SDN controller and/or DCNM may be configured to generate a physical underlay model representing the physical underlay, or network transport capabilities, and/or a logical overlay model representing a logical overlay, or overlay control-plane, of the multi-site network. The SDN controller may also generate an encryption key model representing the associations between the encryption keys and the physical links between the associated network border gateway switches. The SDN controller may utilize the models to determine route paths for transmitting network traffic spanning over different sites of the multi-site network at line speed.

    DYNAMIC NEXT-HOP SELECTION FOR ROUTES IN A NETWORK FABRIC

    公开(公告)号:US20200296039A1

    公开(公告)日:2020-09-17

    申请号:US16886973

    申请日:2020-05-29

    Abstract: A first network device advertises routes of locally connected routes/subnetworks based on the connectivity of the host with respect to peer network devices. The first network device establishes a virtual port channel associated with a virtual network address. The virtual port channel includes the first network device associated with a first network address and a second network device associated with a second network address. The first network device detects that a host is connected to the first network device and determines a next hop address to associate with the host. The next hop address is determined based on whether the host is also connected to the second network device of the virtual port channel. The first network device generates a route advertisement associating the next hop address with the host.

    LEARNING BY INFERENCE FROM BROWNFIELD DEPLOYMENTS

    公开(公告)号:US20200274766A1

    公开(公告)日:2020-08-27

    申请号:US16283958

    申请日:2019-02-25

    Abstract: The present technology provides a system, method and computer-readable medium for configuration pattern recognition and inference, directed to a device with an existing configuration, through an extensible policy framework. The policy framework uses a mixture of python template logic and CLI micro-templates as a mask to infer the intent behind an existing device configuration in a bottom-up learning inference process. Unique values for device/network identifiers and addresses as well as other resources are extracted and accounted for. The consistency of devices within the fabric is checked based on the specific policies built into the extensible framework definition. Any inconsistencies found are flagged for user correction or automatically remedied by a network controller. This dynamic configuration pattern recognition ability allows a fabric to grow without being destroyed and re-created, thus new devices with existing configurations may be added and automatically configured to grow a Brownfield fabric.

    Simulating hosted application performance

    公开(公告)号:US10565083B2

    公开(公告)日:2020-02-18

    申请号:US15835977

    申请日:2017-12-08

    Abstract: A computer-implemented method including causing an application to execute on a private cloud computing network, collecting first performance metrics associated with the application as a result of the application executing on the private cloud computing network, generating a simulated workload based on the first performance metrics, causing the simulated workload to execute on one or more public cloud computing networks, collecting second performance metrics associated with the simulated workload as the simulated workload is executing on the one or more public clouds, and generating, based on the second performance metrics, a recommendation of one of the one or more public cloud computing networks to host the application is disclosed.

    Detecting and mitigating loops
    49.
    发明授权

    公开(公告)号:US10397095B2

    公开(公告)日:2019-08-27

    申请号:US15396873

    申请日:2017-01-03

    Abstract: Access-side loop mitigation may be provided. First, a first edge device may determine that a duplicate host exists on a network. Then the first edge device may detect a loop in response to determining that the duplicate host exists on the network. Detecting the loop may comprise sending a message on a plurality of access-side ports of the first edge device and then receiving, in response to sending the message on the plurality of access-side ports of the first edge device, a response on a first access-side port of the plurality of access-side ports of the first edge device. Next, the first edge device may mitigate the detected loop in response to receiving the response.

    SIMULATING HOSTED APPLICATION PERFORMANCE
    50.
    发明申请

    公开(公告)号:US20190179725A1

    公开(公告)日:2019-06-13

    申请号:US15835977

    申请日:2017-12-08

    Abstract: A computer-implemented method including causing an application to execute on a private cloud computing network, collecting first performance metrics associated with the application as a result of the application executing on the private cloud computing network, generating a simulated workload based on the first performance metrics, causing the simulated workload to execute on one or more public cloud computing networks, collecting second performance metrics associated with the simulated workload as the simulated workload is executing on the one or more public clouds, and generating, based on the second performance metrics, a recommendation of one of the one or more public cloud computing networks to host the application is disclosed.

Patent Agency Ranking